Searched for: contributor%3A%22van+Eeten%2C+M.J.G.+%28graduation+committee%29%22
(1 - 18 of 18)
document
Kloeg, Berend (author)
In today's business landscape, software has become an integral part of operations for all companies, with a growing reliance on third-party components. This increasing complexity in software supply chains has led to a significant reduction in transparency and visibility, posing challenges for effective management and security. Software Bill of...
master thesis 2023
document
Angelova, Yana (author)
In recent years, more and more emphasis has been put on the importance of good preventative cyber security and vulnerability management techniques such as "Patch Tuesday". <br/>Despite the increased importance, not all organisations have the same resources and knowledge when it comes to securing their networks against cyber adversaries. <br/><br...
master thesis 2023
document
van der Meer, Lars (author)
This paper explores the potential of smart contracts in the reinsurance industry to address escalating non-productive costs driven by market dynamics. Reinsurers, aiming to enhance stability amid increasing inflation, claim severity, and frequency, have adopted stricter underwriting criteria and raised premiums. This has led to a more detailed...
master thesis 2023
document
Yeşilli, DORUKHAN (author)
Increasing digitalization of systems bring about the grand challenge of keeping these systems secure from malicious prying eyes, and thus highlighting the need for increased Cybersecurity practices. Ransomware is among the most prevalent cybersecurity threats in our current digital era. The attacks are mainly done by advanced persistent threats ...
master thesis 2023
document
Hilmy Hanif, Hanif (author)
The EU Artificial Intelligence Act (AI Act) proposed by the European Commission is a significant legislative effort to regulate AI systems. It is the first legal framework that specifically addresses the risks associated with AI systems, aiming to ensure their trustworthiness and alignment with the values enshrined in the Charter of the...
master thesis 2023
document
Bahl, Robin (author)
Addressing the growing problem of phishing attacks requires nurturing a reporting culture within organizations. This research examines the factors influencing reporting behavior and the role of infrastructure &amp; support in enhancing reporting rates. By adopting a mixed methods approach and analyzing phishing simulation logs and user...
master thesis 2023
document
Miedema, Fieke (author)
How did Avalanche, a botnet with an active lifetime of 8 years while serving 20+ malware families, ensure a smooth operation of business? Avalanche had the attention of security researchers and law enforcement, yet it managed to persevere for a long period of time.<br/>In this work, we answer this question by analyzing Avalanche’s security...
master thesis 2022
document
LIU, RUOBING (author)
In this thesis I investigate possibilities for expanding freedom of choice in the development and use of digital education technologies. This thesis may be of interest to university policy-makers, students, professors, software-developers, or anyone interested in expanding freedom of choice in the development and use of digital education...
master thesis 2022
document
Mukhamedov, Khamid (author)
In the past several years, financial applications of the blockchain technology experienced significant growth, development and adoption among the public and institutional investors. With the rise of stablecoins and major events such as the announcement of Facebook’s own cryptocurency Libra in 2019, the EU regulators felt the urgent need to...
master thesis 2022
document
van Engelen, Yves (author)
In the current digitalised society keeping assets secure is one of the most prominent challenges organisations face. In the ongoing arms race between attackers and defenders, software security patching is a well-recognised and effective strategy to mitigate vulnerabilities in software products. However, organisations struggle with the best...
master thesis 2022
document
van Veen, Tim (author)
This study investigates organizations’ approaches to managing cybersecurity challenges that are associated with high levels of teleworking. Over the last two and a half years the pandemic forced organizations to implement teleworking models that resulted in a large share of the workforce working from home. The increasing use of teleworking...
master thesis 2022
document
Volten, Cécile (author)
In order to combat financially-economically related crime the government implemented a new directive ensuring that virtual currency exchanges now have to adhere to requirements from legislation countering money laundering. This thesis researches what the extent is of effects that this legislation posed to the daily operations of virtual currency...
master thesis 2021
document
van den Kieboom, Britt (author)
Research shows that most of the security issues arise through human shortcomings, instead of technical issues (Abawajy, 2014). Therefore, users of information systems have to become more security aware. The reasonable solution to these human shortcomings was to provide users with policies that tell them what to do and have the technical systems...
master thesis 2021
document
de Roon, Tom (author)
Connecting ‘things’ like a doorbell, webcam, lamp, or other objects to the web to provide a service or control is called the Internet of Things (IoT). These devices contain vulnerabilities that form risks for the device user and possibly the network owner through their heterogeneity. The identified knowledge gap is the need for more IoT...
master thesis 2021
document
Egbers, Jelle (author)
In the battle against ever-changing cyber threats, a new ally has joined in: Cyber Threat Intelligence. Evolved from historical blacklists and anti-virus, Threat Intelligence aims to protect and inform its clients against both nation state actors, as well as cyber criminals. Threat Intelligence comes in many shapes and sizes, and for a wide...
master thesis 2021
document
van de Laarschot, Jochem (author)
Cybercrime thrives and online anonymous markets, or darknet markets, play an important role in the cybercriminal ecosystem. Vendors active on darknet markets invest in security mechanisms to compromise the availability or usefulness of evidence to Law Enforcement Agencies. Therefore, difficulties arise in linking identities or machines to...
master thesis 2020
document
Charalambous, Georgia (author)
The frequency of online banking fraud incidents has increased over the last years. A method used by different cybercriminals is the injection of malicious code into the targeted web pages. For example, attackers might inject an additional piece code into the webpage of a targeted bank asking users to enter extra personal information (e.g., the...
master thesis 2018
document
Cheung, Ryan (author)
Currently, DDoS attacks have become inevitable for financial services and their threat keeps rising. Numerous researches have focused on the technical since the rise of DDoS amplification attacks. However, there is less understanding regarding their target selection on financial services. This research uses a mixed method approach to capture...
master thesis 2017
Searched for: contributor%3A%22van+Eeten%2C+M.J.G.+%28graduation+committee%29%22
(1 - 18 of 18)